Design for Values in ICT

[1]  Jesper Simonsen,et al.  The Role of Ethnography in the Design and Implementation of IT Systems , 2009 .

[2]  M. Zimmer,et al.  Values and pragmatic action: The challenges of introducing ethical intelligence in technical design communities , 2009 .

[3]  Mark A. Neerincx,et al.  Embedding Stakeholder Values in the Requirements Engineering Process , 2015, REFSQ.

[4]  Donald A. Norman,et al.  User Centered System Design: New Perspectives on Human-Computer Interaction , 1988 .

[5]  Mary Beth Rosson,et al.  Scenario-based design , 2002 .

[6]  S. Schwartz,et al.  Toward a theory of the universal content and structure of values: Extensions and cross-cultural replications. , 1990 .

[7]  Janet Davis,et al.  Informing Public Deliberation: Value Sensitive Design of Indicators for a Large-scale Urban Simulation , 2005, ECSCW.

[8]  Catherine Flick,et al.  Issues, Concepts and Methods Relating to the Identification of the Ethics of Emerging ICTs , 2014, Communications of the IIMA.

[9]  Koen V. Hindriks,et al.  Value-sensitive design patterns for pervasive health care , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[10]  Helen Nissenbaum,et al.  A Method For Discovering Values in Digital Games , 2007, DiGRA Conference.

[11]  Batya Friedman,et al.  Office window of the future? - Field-based analyses of a new use of a large display , 2008, Int. J. Hum. Comput. Stud..

[12]  Jill Palzkill Woelfer,et al.  Improving the safety of homeless young people with mobile phones: values, form and function , 2011, CHI.

[13]  Luke Stark,et al.  Methods to account for values in human-centered computing , 2012, CHI Extended Abstracts.

[14]  Aimee van Wynsberghe,et al.  Designing Robots for Care: Care Centered Value-Sensitive Design , 2013, Sci. Eng. Ethics.

[15]  Batya Friedman,et al.  Trust online , 2000, CACM.

[16]  P. H. Kahn,et al.  Human values, ethics, and design , 2002 .

[17]  Siska Fitrianie,et al.  A SmartTV Platform for Wellbeing, Care and Social Support for Elderly at Home , 2013, ICOST.

[18]  Anna Perini,et al.  Tool-Supported Development with Tropos: The Conference Management System Case Study , 2007, AOSE.

[19]  Batya Friedman,et al.  The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations , 2012, CHI.

[20]  Josep Domingo-Ferrer,et al.  FuturICT — The road towards ethical ICT , 2012, The European Physical Journal Special Topics.

[21]  Brian T. Gill,et al.  A plasma display window?—The shifting baseline problem in a technologically mediated natural world , 2008 .

[22]  Hisato Kobayashi,et al.  Inclusive Society: Health and Wellbeing in the Community, and Care at Home , 2013, Lecture Notes in Computer Science.

[23]  Engin Bozdag,et al.  Designing for diversity in online news recommenders , 2013, 2013 Proceedings of PICMET '13: Technology Management in the IT-Driven Services (PICMET).

[24]  Alan Borning,et al.  Next steps for value sensitive design , 2012, CHI.

[25]  Finn Kensing,et al.  Generating visions: future workshops and metaphorical design , 1992 .

[26]  Rob Kling,et al.  What Is Social Informatics and Why Does It Matter? , 2007, D Lib Mag..

[27]  N. Sharkey,et al.  Granny and the robots: ethical issues in robot care for the elderly , 2012, Ethics and Information Technology.

[28]  Susan Leigh Star,et al.  Sorting Things Out: Classification and Its Consequences , 1999 .

[29]  Kaj Grønbæk,et al.  Cooperative Prototyping: Users and Designers in Mutual Activity , 1990, Int. J. Man Mach. Stud..

[30]  Anders I. Morch NordiCHI 2006 : proceedings of the 4th Nordic Conference on Human-Computer Interaction, 14-18 October, 2006, Oslo, Norway : changing roles , 2006 .

[31]  Susan Wyche,et al.  Values as lived experience: evolving value sensitive design in support of value discovery , 2009, CHI.

[32]  Martin Knapp,et al.  Exploring barriers to participation and adoption of telehealth and telecare within the Whole System Demonstrator trial: a qualitative study , 2012, BMC Health Services Research.

[33]  M. Rokeach The Nature Of Human Values , 1974 .

[34]  Batya Friedman,et al.  “It's the computer's fault”: reasoning about computers as moral agents , 1995, CHI 95 Conference Companion.

[35]  Lauren B. Movius,et al.  U.S. and EU Privacy Policy: Comparison of Regulatory Approaches , 2009 .

[36]  Jill Palzkill Woelfer,et al.  A value sensitive action-reflection model: evolving a co-design space with stakeholder and designer prompts , 2013, CHI.

[37]  Jessica K. Miller,et al.  Value tensions in design: the value sensitive design, development, and appropriation of a corporation's groupware system , 2007, GROUP.

[38]  Helen Nissenbaum,et al.  Bias in computer systems , 1996, TOIS.

[39]  Gyula Sallai,et al.  Defining Infocommunications and Related Terms , 2012, Acta Polytechnica Hungarica.

[40]  Frank M. Shipman,et al.  Social media ownership: using twitter as a window onto current attitudes and beliefs , 2011, CHI.

[41]  Kristina Höök,et al.  Personlig integritet: a comparative study of perceptions of privacy in public places in Sweden and the United States , 2008, NordiCHI.

[42]  Alistair G. Sutcliffe,et al.  Investigating the Role of 'Soft Issues' in the RE Process , 2008, 2008 16th IEEE International Requirements Engineering Conference.

[43]  Martin Peterson,et al.  Is there an ethics of algorithms? , 2011, Ethics and Information Technology.

[44]  Cristiano Castelfranchi,et al.  A cognitive approach to values , 1989 .

[45]  Eamonn O'Neill,et al.  User-Developer Cooperation in Software Development: Building Common Ground and Usable Systems , 2001 .

[46]  Colin Potts,et al.  ScenIC: a strategy for inquiry-driven requirements determination , 1999, Proceedings IEEE International Symposium on Requirements Engineering (Cat. No.PR00188).

[47]  Pascal Wiggers,et al.  Elicitation of situated values: need for tools to help stakeholders and designers to reflect and communicate , 2011, Ethics and Information Technology.

[48]  F. Schneider Trust in Cyberspace , 1998 .

[49]  Alan Borning,et al.  Value Sensitive Design and Information Systems , 2020, The Ethics of Information Technologies.

[50]  Predrag V. Klasnja,et al.  Value scenarios: a technique for envisioning systemic effects of new technologies , 2007, CHI Extended Abstracts.

[51]  Steve Harrison,et al.  Co-creating & identity-making in CSCW: revisiting ethics in design research , 2014, CSCW Companion.

[52]  Barbara Paech,et al.  How to approximate users’ values while preserving privacy: experiences with using attitudes towards work tasks as proxies for personal value elicitation , 2012, Ethics and Information Technology.

[53]  Katie Shilton,et al.  Values Levers , 2013 .

[54]  Natalia Romero Herrera,et al.  AAL-technology acceptance through experience , 2014, PervasiveHealth.

[55]  Helen Nissenbaum,et al.  Software agents and user autonomy , 1997, AGENTS '97.

[56]  Jes A. Koepfler,et al.  Classifying values in informal communication: Adapting the meta-inventory of human values for tweets , 2011, ASIST.

[57]  Helen Nissenbaum,et al.  Values at play: design tradeoffs in socially-oriented game design , 2005, CHI.

[58]  D. Boyd,et al.  Six Provocations for Big Data , 2011 .

[59]  Eli Pariser,et al.  The Filter Bubble: What the Internet Is Hiding from You , 2011 .

[60]  Gilbert Cockton,et al.  Designing worth is worth designing , 2006, NordiCHI '06.

[61]  Tadayoshi Kohno,et al.  Computer security and the modern home , 2013, CACM.

[62]  W. Hoffmann,et al.  Telemedicine and telecare for older patients--a systematic review. , 2012, Maturitas.

[63]  Batya Friedman,et al.  The Watcher and the Watched: Social Judgments About Privacy in a Public Place , 2005, Hum. Comput. Interact..

[64]  Catholijn M. Jonker,et al.  Designing for Self-Reflection on Values for Improved Life Decision , 2014, Interact. Comput..

[65]  Philip M. Napoli Deconstructing the diversity principle , 1999 .

[66]  Jennifer Ann Rode,et al.  (Whose) value-sensitive design: a study of long- distance relationships in an Arabic cultural context , 2011, CSCW.